Unattended Computer Physical Security System
Original Publication Date: 1989-Feb-01
Included in the Prior Art Database: 2005-Jan-27
Encoded cards are read by a proximity system to validate a potential user's authorization to use a protected computer system. To eliminate the vulnerability of a computer system to unauthorized use, a hidden proximity reader can be used to read encoded cards worn by potential system users. The reader has a defined operating range, approximately a five-foot radius, and cards within that range are read and signals are sent to a dedicated computer for user validation. Depending upon an accept or reject signal generated by the dedicated computer, enable or disable commands to either allow or block access to the protected system are transmitted. The security system is completely transparent to the user since the user never actively addresses the security system.